Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 12:04
Static task
static1
Behavioral task
behavioral1
Sample
Mondkalender Juni 2024.docx
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Mondkalender Juni 2024.docx
Resource
win10v2004-20240426-en
General
-
Target
Mondkalender Juni 2024.docx
-
Size
23KB
-
MD5
3ef677a8de313bf179050b2cca78e99d
-
SHA1
7f3551f1f604153891cef33caa47d072d0166c4c
-
SHA256
3d9e6879b8c967d3327c5e433c7027f9e46237e439354c146989577ee035a39f
-
SHA512
235ac611075a8eb71e792879eb0075eff2704b3fccc824dfe6e54da2a95325a6a6f354e8c6b2add8c12c6d7b7920a49678d91b4100e32377d7e034836bcf1671
-
SSDEEP
384:FK5+HRBSbANuNBEFlnkWCh6ZWSxcq4rL910Q75SAxuqelB3GPc7/EoZL47:9HzSbeuNBEnkZ6xJ4H9ZuWPcooZLM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3572 WINWORD.EXE 3572 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE 3572 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Mondkalender Juni 2024.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e